Warning: Permanently added '10.128.0.93' (ECDSA) to the list of known hosts. 2021/05/03 16:12:07 fuzzer started 2021/05/03 16:12:07 dialing manager at 10.128.0.169:34381 2021/05/03 16:12:09 syscalls: 3586 2021/05/03 16:12:09 code coverage: enabled 2021/05/03 16:12:09 comparison tracing: enabled 2021/05/03 16:12:09 extra coverage: enabled 2021/05/03 16:12:09 setuid sandbox: enabled 2021/05/03 16:12:09 namespace sandbox: enabled 2021/05/03 16:12:09 Android sandbox: /sys/fs/selinux/policy does not exist 2021/05/03 16:12:09 fault injection: enabled 2021/05/03 16:12:09 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2021/05/03 16:12:09 net packet injection: enabled 2021/05/03 16:12:09 net device setup: enabled 2021/05/03 16:12:09 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2021/05/03 16:12:09 devlink PCI setup: PCI device 0000:00:10.0 is not available 2021/05/03 16:12:09 USB emulation: enabled 2021/05/03 16:12:09 hci packet injection: enabled 2021/05/03 16:12:09 wifi device emulation: enabled 2021/05/03 16:12:09 802.15.4 emulation: enabled 2021/05/03 16:12:09 fetching corpus: 0, signal 0/2000 (executing program) syzkaller login: [ 71.944811][ T8424] ================================================================== [ 71.953561][ T8424] BUG: KASAN: use-after-free in __skb_datagram_iter+0x6b8/0x770 [ 71.961423][ T8424] Read of size 4 at addr ffff88801da88004 by task syz-fuzzer/8424 [ 71.969354][ T8424] [ 71.971950][ T8424] CPU: 0 PID: 8424 Comm: syz-fuzzer Not tainted 5.12.0-rc8-next-20210423-syzkaller #0 [ 71.983755][ T8424] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 71.994122][ T8424] Call Trace: [ 71.997729][ T8424] dump_stack+0x141/0x1d7 [ 72.002698][ T8424] ? __skb_datagram_iter+0x6b8/0x770 [ 72.009622][ T8424] print_address_description.constprop.0.cold+0x5b/0x2f8 [ 72.017498][ T8424] ? __skb_datagram_iter+0x6b8/0x770 [ 72.023215][ T8424] ? __skb_datagram_iter+0x6b8/0x770 [ 72.028978][ T8424] kasan_report.cold+0x7c/0xd8 [ 72.034323][ T8424] ? __skb_datagram_iter+0x6b8/0x770 [ 72.039779][ T8424] __skb_datagram_iter+0x6b8/0x770 [ 72.045576][ T8424] ? zerocopy_sg_from_iter+0x110/0x110 [ 72.051206][ T8424] skb_copy_datagram_iter+0x40/0x50 [ 72.056886][ T8424] tcp_recvmsg_locked+0x1048/0x22f0 [ 72.065160][ T8424] ? tcp_splice_read+0x8b0/0x8b0 [ 72.070437][ T8424] ? mark_held_locks+0x9f/0xe0 [ 72.075834][ T8424] ? __local_bh_enable_ip+0xa0/0x120 [ 72.082712][ T8424] tcp_recvmsg+0x134/0x550 [ 72.087573][ T8424] ? tcp_recvmsg_locked+0x22f0/0x22f0 [ 72.095155][ T8424] ? aa_sk_perm+0x311/0xab0 [ 72.099703][ T8424] inet_recvmsg+0x11b/0x5e0 [ 72.104405][ T8424] ? inet_sendpage+0x140/0x140 [ 72.109330][ T8424] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 72.116038][ T8424] ? security_socket_recvmsg+0x8f/0xc0 [ 72.122158][ T8424] sock_read_iter+0x33c/0x470 [ 72.127887][ T8424] ? ____sys_recvmsg+0x600/0x600 [ 72.133015][ T8424] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 72.139781][ T8424] ? fsnotify+0xa58/0x1060 [ 72.144373][ T8424] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 72.151606][ T8424] new_sync_read+0x5b7/0x6e0 [ 72.156676][ T8424] ? ksys_lseek+0x1b0/0x1b0 [ 72.161274][ T8424] vfs_read+0x35c/0x570 [ 72.166044][ T8424] ksys_read+0x1ee/0x250 [ 72.170677][ T8424] ? vfs_write+0xa40/0xa40 [ 72.175422][ T8424] ? syscall_enter_from_user_mode+0x27/0x70 [ 72.182358][ T8424] do_syscall_64+0x3a/0xb0 [ 72.187171][ T8424] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 72.193473][ T8424] RIP: 0033:0x4af19b [ 72.198246][ T8424] Code: fb ff eb bd e8 a6 b6 fb ff e9 61 ff ff ff cc e8 9b 82 fb ff 48 8b 7c 24 10 48 8b 74 24 18 48 8b 54 24 20 48 8b 44 24 08 0f 05 <48> 3d 01 f0 ff ff 76 20 48 c7 44 24 28 ff ff ff ff 48 c7 44 24 30 [ 72.219722][ T8424] RSP: 002b:000000c000093828 EFLAGS: 00000212 ORIG_RAX: 0000000000000000 [ 72.228554][ T8424] RAX: ffffffffffffffda RBX: 000000c00001c000 RCX: 00000000004af19b [ 72.239767][ T8424] RDX: 0000000000001000 RSI: 000000c0001ee000 RDI: 0000000000000006 [ 72.248794][ T8424] RBP: 000000c000093878 R08: 0000000000000001 R09: 0000000000000002 [ 72.258800][ T8424] R10: 000000000000508b R11: 0000000000000212 R12: 0000000000005082 [ 72.267291][ T8424] R13: 0000000000000040 R14: 0000000000000010 R15: 0000000000000010 [ 72.277304][ T8424] [ 72.281129][ T8424] Allocated by task 6461: [ 72.285842][ T8424] kasan_save_stack+0x1b/0x40 [ 72.290903][ T8424] __kasan_slab_alloc+0x84/0xa0 [ 72.295783][ T8424] kmem_cache_alloc+0x219/0x3a0 [ 72.300915][ T8424] getname_flags.part.0+0x50/0x4f0 [ 72.307337][ T8424] getname+0x8e/0xd0 [ 72.311249][ T8424] do_sys_openat2+0xf5/0x420 [ 72.316339][ T8424] __x64_sys_open+0x119/0x1c0 [ 72.321153][ T8424] do_syscall_64+0x3a/0xb0 [ 72.325762][ T8424] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 72.332115][ T8424] [ 72.334557][ T8424] Freed by task 78: [ 72.338527][ T8424] kasan_save_stack+0x1b/0x40 [ 72.343421][ T8424] kasan_set_track+0x1c/0x30 [ 72.348259][ T8424] kasan_set_free_info+0x20/0x30 [ 72.353741][ T8424] __kasan_slab_free+0xfb/0x130 [ 72.359096][ T8424] slab_free_freelist_hook+0xdf/0x240 [ 72.365211][ T8424] kmem_cache_free+0x97/0x750 [ 72.372157][ T8424] putname+0xe1/0x120 [ 72.377703][ T8424] do_sys_openat2+0x153/0x420 [ 72.382843][ T8424] __x64_sys_open+0x119/0x1c0 [ 72.389184][ T8424] do_syscall_64+0x3a/0xb0 [ 72.395743][ T8424] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 72.402369][ T8424] [ 72.405274][ T8424] The buggy address belongs to the object at ffff88801da88000 [ 72.405274][ T8424] which belongs to the cache names_cache of size 4096 [ 72.422388][ T8424] The buggy address is located 4 bytes inside of [ 72.422388][ T8424] 4096-byte region [ffff88801da88000, ffff88801da89000) [ 72.440042][ T8424] The buggy address belongs to the page: [ 72.448596][ T8424] page:ffffea000076a200 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1da88 [ 72.461538][ T8424] head:ffffea000076a200 order:3 compound_mapcount:0 compound_pincount:0 [ 72.471283][ T8424] flags: 0xfff00000010200(slab|head|node=0|zone=1|lastcpupid=0x7ff) [ 72.480901][ T8424] raw: 00fff00000010200 0000000000000000 0000000300000001 ffff8880111be280 [ 72.489512][ T8424] raw: 0000000000000000 0000000000070007 00000001ffffffff 0000000000000000 [ 72.499337][ T8424] page dumped because: kasan: bad access detected [ 72.506655][ T8424] [ 72.509282][ T8424] Memory state around the buggy address: [ 72.514924][ T8424] ffff88801da87f00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 72.523089][ T8424] ffff88801da87f80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 72.531254][ T8424] >ffff88801da88000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 72.539457][ T8424] ^ [ 72.543675][ T8424] ffff88801da88080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 72.552301][ T8424] ffff88801da88100: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 72.560935][ T8424] ================================================================== [ 72.569124][ T8424] Disabling lock debugging due to kernel taint [ 72.576956][ T8424] Kernel panic - not syncing: panic_on_warn set ... [ 72.583988][ T8424] CPU: 1 PID: 8424 Comm: syz-fuzzer Tainted: G B 5.12.0-rc8-next-20210423-syzkaller #0 [ 72.595924][ T8424] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 72.606300][ T8424] Call Trace: [ 72.609698][ T8424] dump_stack+0x141/0x1d7 [ 72.614246][ T8424] panic+0x306/0x73d [ 72.618187][ T8424] ? __warn_printk+0xf3/0xf3 [ 72.623344][ T8424] ? preempt_schedule_common+0x59/0xc0 [ 72.629597][ T8424] ? __skb_datagram_iter+0x6b8/0x770 [ 72.635341][ T8424] ? preempt_schedule_thunk+0x16/0x18 [ 72.641134][ T8424] ? trace_hardirqs_on+0x38/0x1c0 [ 72.646528][ T8424] ? trace_hardirqs_on+0x51/0x1c0 [ 72.652315][ T8424] ? __skb_datagram_iter+0x6b8/0x770 [ 72.657855][ T8424] ? __skb_datagram_iter+0x6b8/0x770 [ 72.663176][ T8424] end_report.cold+0x5a/0x5a [ 72.667971][ T8424] kasan_report.cold+0x6a/0xd8 [ 72.673060][ T8424] ? __skb_datagram_iter+0x6b8/0x770 [ 72.678967][ T8424] __skb_datagram_iter+0x6b8/0x770 [ 72.684300][ T8424] ? zerocopy_sg_from_iter+0x110/0x110 [ 72.690165][ T8424] skb_copy_datagram_iter+0x40/0x50 [ 72.695408][ T8424] tcp_recvmsg_locked+0x1048/0x22f0 [ 72.700664][ T8424] ? tcp_splice_read+0x8b0/0x8b0 [ 72.705815][ T8424] ? mark_held_locks+0x9f/0xe0 [ 72.710899][ T8424] ? __local_bh_enable_ip+0xa0/0x120 [ 72.716354][ T8424] tcp_recvmsg+0x134/0x550 [ 72.720934][ T8424] ? tcp_recvmsg_locked+0x22f0/0x22f0 [ 72.728145][ T8424] ? aa_sk_perm+0x311/0xab0 [ 72.732825][ T8424] inet_recvmsg+0x11b/0x5e0 [ 72.737814][ T8424] ? inet_sendpage+0x140/0x140 [ 72.743437][ T8424] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 72.751606][ T8424] ? security_socket_recvmsg+0x8f/0xc0 [ 72.757740][ T8424] sock_read_iter+0x33c/0x470 [ 72.762718][ T8424] ? ____sys_recvmsg+0x600/0x600 [ 72.767972][ T8424] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 72.774523][ T8424] ? fsnotify+0xa58/0x1060 [ 72.780039][ T8424] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 72.786857][ T8424] new_sync_read+0x5b7/0x6e0 [ 72.791501][ T8424] ? ksys_lseek+0x1b0/0x1b0 [ 72.796157][ T8424] vfs_read+0x35c/0x570 [ 72.800672][ T8424] ksys_read+0x1ee/0x250 [ 72.805177][ T8424] ? vfs_write+0xa40/0xa40 [ 72.809718][ T8424] ? syscall_enter_from_user_mode+0x27/0x70 [ 72.815736][ T8424] do_syscall_64+0x3a/0xb0 [ 72.820735][ T8424] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 72.826979][ T8424] RIP: 0033:0x4af19b [ 72.831140][ T8424] Code: fb ff eb bd e8 a6 b6 fb ff e9 61 ff ff ff cc e8 9b 82 fb ff 48 8b 7c 24 10 48 8b 74 24 18 48 8b 54 24 20 48 8b 44 24 08 0f 05 <48> 3d 01 f0 ff ff 76 20 48 c7 44 24 28 ff ff ff ff 48 c7 44 24 30 [ 72.851267][ T8424] RSP: 002b:000000c000093828 EFLAGS: 00000212 ORIG_RAX: 0000000000000000 [ 72.860197][ T8424] RAX: ffffffffffffffda RBX: 000000c00001c000 RCX: 00000000004af19b [ 72.868849][ T8424] RDX: 0000000000001000 RSI: 000000c0001ee000 RDI: 0000000000000006 [ 72.877427][ T8424] RBP: 000000c000093878 R08: 0000000000000001 R09: 0000000000000002 [ 72.885648][ T8424] R10: 000000000000508b R11: 0000000000000212 R12: 0000000000005082 [ 72.894067][ T8424] R13: 0000000000000040 R14: 0000000000000010 R15: 0000000000000010 [ 72.903792][ T8424] Kernel Offset: disabled [ 72.909424][ T8424] Rebooting in 86400 seconds..